This paper examines the incentives of private actors to invest in cybersecurity. Prior analyses have examined investments in security goods, such as locks or safes that have the characteristics of private goods. The analysis in this paper extends this analysis to examine expenditures on security goods, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the p...
MBA Professional ReportThe explosive growth of cyberspace into many aspects of peoples' lives over t...
Cybersecurity has dominated recent headlines, but policy makers and pundits alike still combine diff...
Attempts to improve the state of cyber-security have been on the rise over the past years. The impor...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
200 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.In Chapter 4, we study a mode...
A model is presented wherein cybercrimes are addressed through a combination of private and public m...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Digitalisation has tremendous benefits while simultaneously elevating cybersecurity to a prominent t...
Cybersecurity has all the characteristics of a private good. However, the determinants of market mec...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
The United States does not possess a sufficient cyber security framework. Over eighty-five percent o...
MBA Professional ReportThe explosive growth of cyberspace into many aspects of peoples' lives over t...
Cybersecurity has dominated recent headlines, but policy makers and pundits alike still combine diff...
Attempts to improve the state of cyber-security have been on the rise over the past years. The impor...
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Com...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
200 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.In Chapter 4, we study a mode...
A model is presented wherein cybercrimes are addressed through a combination of private and public m...
Given that information technology (IT) security has emerged as an important issue in the last few ye...
Financial decisions indirectly affect and are affected by the effort towards Information Security. T...
This paper develops a theory of sequential investments in cybersecurity in which the software vendor...
Digitalisation has tremendous benefits while simultaneously elevating cybersecurity to a prominent t...
Cybersecurity has all the characteristics of a private good. However, the determinants of market mec...
An economic perspective has yielded invaluable insights into the analysis and design of information ...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
The United States does not possess a sufficient cyber security framework. Over eighty-five percent o...
MBA Professional ReportThe explosive growth of cyberspace into many aspects of peoples' lives over t...
Cybersecurity has dominated recent headlines, but policy makers and pundits alike still combine diff...
Attempts to improve the state of cyber-security have been on the rise over the past years. The impor...